With the development of cloud computing, Data security becomes more and more important in cloud computing. This paper analyses the basic problem of cloud computing data security. .
Cloud Computing provides the way to share distributed resources and services that belong to different organizations or sites. Since Cloud Computing share distributed resources via network in the open environment thus it makes security problems
In this method some important security services including authentication, encryption and decryption and compression are provided in Cloud Computing system.
DATA SECURITY IN CLOUD COMPUTING:
Data outsourcing: users are relieved from the burden of data storage and maintenance
When users put their data (of large size) on the cloud, the data integrity protection is challenging
Enabling public audit for cloud data storage security is important.
Cloud computing is built on top of virtualization, if there are security issues with virtualization, then there will also security issues with cloud computing.
Data segregation. Data in the cloud is typically in a shared environment alongside data from other customers. Encryption is effective but isn’t a cure-all. The cloud provider should provide evidence that encryption schemes were designed and tested by experienced specialists.
A data center full of servers supporting cloud computing is internally and externally indistinguishable from a data center full of “regular” servers. In each case, it will be important for the data center to be physically secure against unauthorized access.
Computer and network security is fundamentally about three goals/objectives:
— confidentiality (C)
— integrity (I), and
— availability (A).
Confidentiality refers to keeping data private. Privacy is of the amount importance as data leaves the borders of the organization. Not only must internal secrets and sensitive personal data be safeguarded, but metadata and transactional data can also leak important details about firms or individuals. Confidentiality is supported by, among other things, technical tools such as encryption and access control, as well as legal protections
Integrity is a degree confidence that the data in the cloud is what is supposed to be there, and is protected against accidental or intentional alteration without authorization. It also extends to the hurdles of synchronizing multiple databases. Integrity is supported by well audited code, well-designed distributed systems, and robust access control mechanisms.
Availability means being able to use the system as anticipated. Cloud technologies can increase availability through widespread internet-enabled access, but the client is dependent on the timely and robust provision of resources. Availability is supported by capacity building and good architecture by the provider, as well as well-defined contracts and terms of agreement
Reduces the exposure of sensitive data
Simplifies security auditing & testing
Enables automated security management
Improves redundancy & disaster recovery
Latest technologies used in data security in cloud computing:
- Latest Training Program on Cloud Computing and Windows Azure In order to address the aforementioned challenges, Fujitsu Laboratories developed new cloud information gateway technology that can flexibly control data, including data content, transmitted from the inside of a company to a cloud and between multiple clouds.
- In addition to the option of blocking confidential data, the data gateway also includes the following three features.
Data Masking Technology
Secure Logic Migration and Execution Technology
Data Traceability Technology
0 Comments